Security Engineering. Ross Anderson
Чтение книги онлайн.

Читать онлайн книгу Security Engineering - Ross Anderson страница 4

Название: Security Engineering

Автор: Ross Anderson

Издательство: John Wiley & Sons Limited

Жанр: Зарубежная компьютерная литература

Серия:

isbn: 9781119642817

isbn:

СКАЧАТЬ Notes CHAPTER 23: Electronic and Information Warfare 23.1 Introduction 23.2 Basics 23.3 Communications systems 23.4 Surveillance and target acquisition 23.5 IFF systems 23.6 Improvised explosive devices 23.7 Directed energy weapons 23.8 Information warfare 23.9 Summary Research problems Further reading Note CHAPTER 24: Copyright and DRM 24.1 Introduction 24.2 Copyright 24.3 DRM on general-purpose computers 24.4 Information hiding 24.5 Policy 24.6 Accessory control 24.7 Summary Research problems Further reading Notes CHAPTER 25: New Directions? 25.1 Introduction 25.2 Autonomous and remotely-piloted vehicles 25.3 AI / ML 25.4 PETS and operational security 25.5 Elections 25.6 Summary Research problems Further reading Notes

      10  PART III CHAPTER 26: Surveillance or Privacy? 26.1 Introduction 26.2 Surveillance 26.3 Terrorism 26.4 Censorship 26.5 Forensics and rules of evidence 26.6 Privacy and data protection 26.7 Freedom of information 26.8 Summary Research problems Further reading Notes CHAPTER 27: Secure Systems Development 27.1 Introduction 27.2 Risk management 27.3 Lessons from safety-critical systems 27.4 Prioritising protection goals 27.5 Methodology 27.6 Managing the team 27.7 Summary Research problems Further reading Notes CHAPTER 28: Assurance and Sustainability 28.1 Introduction 28.2 Evaluation 28.3 Metrics and dynamics of dependability 28.4 The entanglement of safety and security 28.5 Sustainability 28.6 Summary Research problems Further reading Notes CHAPTER 29: Beyond “Computer Says No”

      11  Bibliography

      12  Index

      13  End User License Agreement

      List of Illustrations

      1 Chapter 1Figure 1.1: – Security Engineering Analysis Framework

      2 Chapter 2Figure 2.1: Muscular – the slide

      3 Chapter 4Figure 4.1: Password generator useFigure 4.2: The MIG-in-the middle attackСКАЧАТЬ